Database incident table, Database Management System

The Incident table, with an auto-incrementing incident number, etc, looks like:

incident_num

reporter

date

time

incident_description

category

1

john1

2011-01-10

16:17:34

Can't remote login to AFS

network

2

bert456

2011-01-04

15:09:57

Password reset failed

system

4

john1

2010-12-29

15:10:59

DB Account requested

DB admin

Data sources:  The times and dates are internally generated by MySQL based on the data types used in the table. The remaining fields, with the exception of the Incident_num which is internally generated, are determined by the HTML form inputs.  Some form inputs are not inserted into the database but just used to guide processing [like the reporters indication as to whether they want an email copy of a submitted report,  or not].  Some inputs like the email address, and the reporter (name) and password are already in database tables, and are only accessed [retrieved] for purposes of controlling authentication or email authorization.  Some database columns, like the email limit for a reporter and their current number of sent emails, are entered manually using phpMyAdmin.  They may be accessed for decision-making [like the email limit for an address] and update by the program when an email is sent.

Posted Date: 3/29/2013 5:50:48 AM | Location : United States







Related Discussions:- Database incident table, Assignment Help, Ask Question on Database incident table, Get Answer, Expert's Help, Database incident table Discussions

Write discussion on Database incident table
Your posts are moderated
Related Questions
Differance between internal and external schema? Internal and external schema: Internal Schema • Describes the physical storage structure • Uses a physical data model External

What are the properties in a relation ? In a relation Ordering of rows is immaterial and No two rows are identical.


First Normal Form and second normal form First Normal Form (1NF) A relation is said to be in 1NF if it having no non-atomic values and each row can give a unique combinat

Describe Hashing in DBMS? Hashing: Hashing is a technique to store data within an array so which storing, searching, inserting and deleting data is fast (in theory it's O(1))

What is a Data Flow Diagram?  Data Flow Diagram: A data flow diagram is the graph that shows flow of data values from their sources in objects in the course of processes whic

If R1 and R2 are two union compatible relations or functions, then the result of R3 = R1 ∩R2 is the relation that contains all tuples that are in both the relations In other words,

Let us first look into some of the important features of ER model. Entity relationship model is a high-level conceptual data model. It permits us to define the data invo

How are tables stored on Disk? We realise that every record of a table can have different amounts of data. This is due to in some records; some attribute values may be "zero".

What is D command work in the respect of QBE? D: It is the command inside QBE to delete tuple(s) from the relation.